Analysis
-
max time kernel
152s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe
Resource
win10v2004-20220812-en
General
-
Target
eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe
-
Size
144KB
-
MD5
7d301d26cf057491fd615055ab4a9810
-
SHA1
bbebd81db6d7c81e1785bb3d7ec948112b5d9d9d
-
SHA256
eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe
-
SHA512
47517f8943cb16fbc36578e341769e85fda8045f4b9f556e612797f6840622ca89c7e260ab540ff6bb475b1ed9d2c3146555a443496b38ab2df01ef7cc4344db
-
SSDEEP
3072:DQIURTXJ+MrzhYWW/+dwrtn4KIOWD0Gnm3bJZ3fbv7:Ds9raWW/Mwrtn4KCmLr7
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3796 eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe 4908 rundll32.exe 4960 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google = "rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Google\\qwpinuip.dll,ir_fe_ocr_post" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4908 rundll32.exe 4908 rundll32.exe 4960 rundll32.exe 4960 rundll32.exe 4960 rundll32.exe 4960 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4908 3796 eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe 81 PID 3796 wrote to memory of 4908 3796 eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe 81 PID 3796 wrote to memory of 4908 3796 eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe 81 PID 4908 wrote to memory of 4960 4908 rundll32.exe 82 PID 4908 wrote to memory of 4960 4908 rundll32.exe 82 PID 4908 wrote to memory of 4960 4908 rundll32.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe"C:\Users\Admin\AppData\Local\Temp\eeb4c989974756c8aa66ad3e5cae686e677092f53238d94d5ab9a23dd62a3ffe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\nsv988.tmp\kjndazmq.dll",ir_fe_ocr_post2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Google\qwpinuip.dll,ir_fe_ocr_post3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD58acb20047304787243e90c5f9f13d58e
SHA1b907e57c050dc1177d7f3d8f2160a8f207a81c06
SHA256dad2cdff860009687e27775f7f16881491ec7fc10526e341ca48382fe19c2ef0
SHA5126213f75dbd2c358103248218c0ebe110cc855f74da4ecad96a39acb0d4ca807b9298a71ff5b7ffcc1f2260ceb4f2779956d2a64cbbffe364227c0d6d8bdaedd5
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
312KB
MD58acb20047304787243e90c5f9f13d58e
SHA1b907e57c050dc1177d7f3d8f2160a8f207a81c06
SHA256dad2cdff860009687e27775f7f16881491ec7fc10526e341ca48382fe19c2ef0
SHA5126213f75dbd2c358103248218c0ebe110cc855f74da4ecad96a39acb0d4ca807b9298a71ff5b7ffcc1f2260ceb4f2779956d2a64cbbffe364227c0d6d8bdaedd5
-
Filesize
312KB
MD58acb20047304787243e90c5f9f13d58e
SHA1b907e57c050dc1177d7f3d8f2160a8f207a81c06
SHA256dad2cdff860009687e27775f7f16881491ec7fc10526e341ca48382fe19c2ef0
SHA5126213f75dbd2c358103248218c0ebe110cc855f74da4ecad96a39acb0d4ca807b9298a71ff5b7ffcc1f2260ceb4f2779956d2a64cbbffe364227c0d6d8bdaedd5